User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.

Slides:



Advertisements
Similar presentations
Behavior-based Authentication Systems
Advertisements

Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov
Biometrics: Identity Verification in a Networked World
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Intrusion Detection Using Hybrid Neural Networks Vishal Sevani ( )
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
By: Navid Bahrani, Niloufar Azmi, Majid Mafi
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Back-Propagation MLP Neural Network Optimizer ECE 539 Andrew Beckwith.
NEURAL NETWORKS FOR DATA MINING
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Protein motif extraction with neuro-fuzzy optimization Bill C. H. Chang and Author : Bill C. H. Chang and Saman K. Halgamuge Saman K. Halgamuge Adviser.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
BIOMETRICS.
Keystroke Dynamics By Hafez Barghouthi.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Neural Network Architecture Session 2
Access control techniques
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
Seminar Presentation on Biometrics
Dynamic Authentication of Typing Patterns
Asst. Prof. Arvind Selwal, CUJ,Jammu
network of simple neuron-like computing elements
A SEMINAR REPORT ON BIOMETRICS
An Improved Neural Network Algorithm for Classifying the Transmission Line Faults Slavko Vasilic Dr Mladen Kezunovic Texas A&M University.
Dynamic Authentication of Typing Patterns
Department of Electrical Engineering
Presentation transcript:

User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville

Three types of authentication  Something you know. A password  Something you have. An ID card or badge  Something you are. Biometrics

 Biometrics measure physical or behavioral characteristics of an individual. –Physical (do not change over time): –Fingerprint, iris pattern, hand geometry –Behavioral (may change over time): –Signature, speech pattern, keystroke pattern

Keystroke biometrics  A keystroke dynamic is based on the assumption that each person has a unique keystroke rhythm.  Keystroke features are: –Latency between keystrokes. –Duration of key presses.  4 possible authentication outcomes: i)Genuine individual is accepted. ii)Genuine individual is rejected. iii)Imposter is accepted. iv)Imposter is rejected.  Biometric classification accuracy measures i)FRR – false rejection rate (ii) ii)FAR – false acceptance rate (iii) iii)EER – equal error rate FRR = FAR

Methods for classifying keystroke rhythms  Statistical / probabilistic approaches  Data Mining Techniques  Neural Networks a)EBP networks b)CPNN (based on SOM) c)ART2 networks (unsupervised learning) d)LVQ networks e)RBFN

Project Description  Authenticate users based on the keystroke times captured while typing their name.  Use EBP to train a neural network to generate a user identification that can be compared to a known user identification.  Result of the system will be either authentication failed or authentication successful.

Methodology flowchart

Implementation  Capturing keystrokes: GUI in C# –Requirements Near microsecond accuracy (HiPerfTimer) Enrollment times and labels Authentication using captured times. Remote call Matlab to processes times.  Processing Data, Matlab –Subroutines needed Error back propagation Evaluate a vector of authentication times using trained network Normalization of training times Normalization of authentication times

Capturing Training Times  Time the interval between successive key_up and key_down events, keystroke latency.  Maximum of 50 time intervals can be captured and stored.  Unused elements are set to 0.  User must correctly type name or trial is thrown out.  Training times are stored in a text file.  Additional training times are appended to this file.  An enrollment is comprised of 7 successful (correct name typed) captures.  After enrollment the neural network is retrained.

Labeling training times  Each user is represented by a binary string –Ex. User Jeff Hieb: User Kunal Pharas:0 1 0 User Suman:0 0 1  Training labels are stored in a text file: Each line in the file is the user label for the same line in the training file. Additional training labels are appended to this file.  When a new user enrolls a 0 is appended to all existing user labels in the file.

Training Data Files  Sample of training times file:  Sample of training labels file:

Training the Neural Network  GUI calls Matlab function EBP(filename) where filename denotes the training times and training labels.  EBP normalizes the data and stores the normalization parameters in a file  Number of output neurons is determined by the training labels, 5 users  5 output neurons.  Output layer uses uni-polar activation function.  Trained weights are stored in file.

Authentication  Capture keystrokes using same procedure as before.  If user mistypes name, authentication fails, but user is informed why and trial is discarded.  GUI calls matlab function evaluate(filename) where filename is a file containing the captured times.  Evaluate normalizes the data using the parameters stored during training  Evaluate then uses the stored weights to produce the output of the network, which are returned  The GUI maps the network output to a string of 0’s and 1’s.  If f(net) is greater than alpha (i.e..95) then the value is 1, otherwise the value is 0.  This string is then compared to the desired user string.  If there is a match, authentication is successful, other wise authentication fails.

Keystroke capture and authentication GUI

Testing and Results  Enrolled 7 users (49 training pairs).  Each user had at least 3 authentication attempts (total of 45 authentication trials).  42 imposter trials.  The majority of imposter authentication attempts were made by us.  Many authentication trials are for one user.

Plot of Normalized Training Times

Effect of hidden layers on accuracy Alpha =.95 C =.2 Emax =.0005

Effect of Training error on accuracy Alpha =.95 C =.2 Hidden Neurons = 24

Overall Classifier Accuracy Max error =.0005 C =.2 Hidden Neurons = 24 Best performance Alpha =.75 FRR = 7% FAR = 30%

Conclusions  For users short name (less than 8 characters) or with long latency (not proficient typists) circumvention was high.  Creating an interface that is acceptable and easy to use for a wide variety of users is not trivial.  Not allowing for typographical errors is irritating to users and may effect acceptance.  Don’t require imposter training samples.

Future Research Directions  Ways of handling typographical errors.  Ways to scale keystroke biometrics to large numbers of users.  Explore other methods of evaluations, particularly unsupervised learning.  Explore extraction of more sophisticated keystroke features.

Questions ?

References  J. Bechtel, “Passphrase authentication based on typing style through an ART 2 Neural network,” IJCIA Vol. 2, No. 2 (2002) pp 1 –22.  A. Peacock, “Typing Patters: A Key to User Identification,” IEEE Security and Privacy, September / October 2004, pp  L. Araujo, “User Authentication Through Typing Biometrics Features,” IEEE Transactions on Signal Processing, Vol. 53, No. 2, February  A. Guven, “Understanding users’ keystroke patters for computer access security,” Computers & Security, Vol. 22, No. 8, 2003, pp  F. Monrose “Keystroke dynamics as a biometric for authentication,” Future Generation Computer Systems, Vol. 16, 2000, pp  M. Obiadat, “An On-Line Neural Network System for Computer Access Security,” IEEE Transactions On Industrial Electronics, Vol. 40, No. 2, April 1993, pp